167 Scheduling is the process by which decisions are made concerning:A. Tasks to be accomplished.B. Personnel/organization that will be assigned to accomplish the task.C. Time when the tasks are to be completed.D. All of the above.E. A and C only

题目

167 Scheduling is the process by which decisions are made concerning:

A. Tasks to be accomplished.

B. Personnel/organization that will be assigned to accomplish the task.

C. Time when the tasks are to be completed.

D. All of the above.

E. A and C only


相似考题
参考答案和解析
正确答案:E
更多“167 Scheduling is the process by which decisions are made concerning:A. Tasks to be accomplished.B. Personnel/organization that will be assigned to accomplish the task.C. Time when the tasks are to be completed.D. All of the above.E. A and C only”相关问题
  • 第1题:

    139 The scope baseline once established and approved, is used:

    A. as the basis for making future decisions.

    B. to accomplish verification measures.

    C. to evaluate potential changes.

    D. All of the above.

    E. A and C only


    正确答案:D

  • 第2题:

    145 Scheduling systems such as PERT, ADM, and PDM are project management tools to be used by:

    A. The project manager and project office personnel.

    B. The project team and functional managers.

    C. The project sponsor.

    D. All of the above.

    E. A and B only


    正确答案:E

  • 第3题:

    102 A Gantt chart is useful in determining:

    A. the level of effort for a task

    B. when a task starts and stops

    C. how tasks are related to each other

    D. who is assigned to do a task

    E. All of the above


    正确答案:B

  • 第4题:

    ● A Gantt chart is useful in determining:

    A the level of effort for a task

    B when a task starts and stops

    C how tasks are related to each other

    D who is assigned to do a task

    E All of the above.


    正确答案:B

  • 第5题:

    Which tasks can be accomplished using the DBMS_LOB. SETOPTIONS procedure?()

    A. only encryption and compression settings for all SecureFile LOBs

    B. only encryption and deduplication settings for only SecureFile CLOBs

    C. deduplication, encryption, and compression settings for all SecureFile LOBs

    D. deduplication, encryption, and compression settings only for SecureFile CLOBs


    参考答案:C

  • 第6题:

    Which two are true concerning a multitenant container database with three pluggable database?()

    A. All administration tasks must be done to a specific pluggable database.

    B. The pluggable databases increase patching time.

    C. The pluggable databases reduce administration effort.

    D. The pluggable databases are patched together.

    E. Pluggable databases are only used for database consolidation.


    参考答案:C, D, E

  • 第7题:

    Concerning the identification signal for a pilot vessel, in fog, which statement is TRUE?___.

    A.When at anchor, the pilot vessel is only required to sound anchor signals

    B.The identification signal must be sounded any time the pilot vessel is underway

    C.The pilot vessel may only sound the identity signal when making way

    D.All of the above


    正确答案:A
    雾中有关引水船的识别信号,哪句是正确的?当锚泊时,引水船仅被要求鸣放锚泊船信号.

  • 第8题:

    Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery. Which two tasks would you be required to perform in the recovery process?()

    • A、 open the database with the RESTRICTED option
    • B、 open the database with the RESETLOGS option
    • C、 recover to the required SCN only that data file in which the error occurred
    • D、 recover all the data files to the same system change number (SCN)

    正确答案:B,D

  • 第9题:

    Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery.  Which two tasks would you be required to perform in the recovery process? ()

    • A、open the database with the RESETLOGS option
    • B、open the database with the RESTRICTED option
    • C、recover all the data files to the same system change number (SCN)
    • D、recover to the required SCN only that data file in which the error occurred

    正确答案:A,C

  • 第10题:

    You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()

    • A、Add the Task_Admin role to thedb_accessadmin fixed database role.
    • B、Grant Update permissions on the Tasks table to the Task_Admin role.
    • C、Grant Update  permissions on  the  Tasks table to  the  User  1  role foreach  column  except the  Close  Dateand Estimated  Time columns.
    • D、Createan  INSTEAD OF trigger  on  the  Tasks Table. Use theIs_Member function  toprevent the  User  1  role from updating the Close  Date and Estimated  Time columns.

    正确答案:B,C

  • 第11题:

    多选题
    Which two are true concerning a multitenant container database with three pluggable database?()
    A

    All administration tasks must be done to a specific pluggable database.

    B

    The pluggable databases increase patching time.

    C

    The pluggable databases reduce administration effort.

    D

    The pluggable databases are patched together.

    E

    Pluggable databases are only used for database consolidation.


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    单选题
    Which tasks can be accomplished using the DBMS_LOB. SETOPTIONS procedure?()
    A

     only encryption and compression settings for all SecureFile LOBs

    B

     only encryption and deduplication settings for only SecureFile CLOBs

    C

     deduplication,encryption,and compression settings for all SecureFile LOBs

    D

     deduplication,encryption,and compression settings only for SecureFile CLOBs


    正确答案: B
    解析: 暂无解析

  • 第13题:

    14 The scope management provides:

    A. A basis for future decisions about the project.

    B. A baseline to accomplish verification measures.

    C. A baseline to evaluate potential scope changes.

    D. All of the above.

    E. B and C only


    正确答案:D

  • 第14题:

    20 A Gantt chart is useful in determining:

    A. the level of effort for a task

    B when a task starts and stops

    C. how tasks are related to each other

    D. who is assigned to do a task

    E. All of the above


    正确答案:B

  • 第15题:

    148 Work packages are used to:

    A. Represent units of work at a level where work is performed.

    B. Clearly distinguish one work package from all others assigned to a single functional group.

    C. Limit the work to be performed to relatively short periods of time.

    D. All of the above.

    E. A and B only


    正确答案:D

  • 第16题:

    ● The critical path is calculated by

    A subtracting the end date of task one from the start date of task two.

    B determining which tasks have the least amount of total slack.

    C totaling the time for all activities.

    D determining the shortest path through the network.

    E Determining which tasks have the most slack


    正确答案:B

  • 第17题:

    Which three statements correctly describe the features of the I/O calibration process?()

    A. Only one I/O calibration process can run at a time.

    B. It automates the resource allocation for the Automated Maintenance Tasks.

    C. It improves the performance of the performance-critical sessions while running.

    D. It can be used to estimate the maximum number of I/Os and maximum latency time for the system.

    E. The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.


    参考答案:A, D, E

  • 第18题:

    People tend to make mistake when ____.

    A. they perform. several challenging tasks at a time.

    B. new messages are processed one after another

    C. their relationships with others are affected

    D. the tasks require little thought


    正确答案:A
    解析:细节理解题。根据第三段内容,特别是最后一句话可知当人在同时从事两项或多项需要花费精力的工作时,常常会出错。故选择A。

  • 第19题:

    Which three statements correctly describe the features of the I/O calibration process?()

    • A、Only one I/O calibration process can run at a time.
    • B、It automates the resource allocation for the Automated Maintenance Tasks.
    • C、It improves the performance of the performance-critical sessions while running.
    • D、It can be used to estimate the maximum number of I/Os and maximum latency time for the system.
    • E、The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.

    正确答案:A,D,E

  • 第20题:

    Which two are true concerning a multitenant container database with three pluggable database?()

    • A、All administration tasks must be done to a specific pluggable database.
    • B、The pluggable databases increase patching time.
    • C、The pluggable databases reduce administration effort.
    • D、The pluggable databases are patched together.
    • E、Pluggable databases are only used for database consolidation.

    正确答案:C,D,E

  • 第21题:

    Which tasks can be accomplished using the DBMS_LOB. SETOPTIONS procedure?()  

    • A、 only encryption and compression settings for all SecureFile LOBs
    • B、 only encryption and deduplication settings for only SecureFile CLOBs
    • C、 deduplication,encryption,and compression settings for all SecureFile LOBs
    • D、 deduplication,encryption,and compression settings only for SecureFile CLOBs

    正确答案:C

  • 第22题:

    多选题
    You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()
    A

    Add the Task_Admin role to thedb_accessadmin fixed database role.

    B

    Grant Update permissions on the Tasks table to the Task_Admin role.

    C

    Grant Update  permissions on  the  Tasks table to  the  User  1  role foreach  column  except the  Close  Dateand Estimated  Time columns.

    D

    Createan  INSTEAD OF trigger  on  the  Tasks Table. Use theIs_Member function  toprevent the  User  1  role from updating the Close  Date and Estimated  Time columns.


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three statements correctly describe the features of the I/O calibration process?()
    A

    Only one I/O calibration process can run at a time.

    B

    It automates the resource allocation for the Automated Maintenance Tasks.

    C

    It improves the performance of the performance-critical sessions while running.

    D

    It can be used to estimate the maximum number of I/Os and maximum latency time for the system.

    E

    The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.


    正确答案: B,C
    解析: 暂无解析